05550nam 2200757 450 991081431140332120230912123048.01-118-79083-91-118-79082-0(CKB)2670000000493621(EBL)1568423(SSID)ssj0001154134(PQKBManifestationID)11608875(PQKBTitleCode)TC0001154134(PQKBWorkID)11161725(PQKB)10156180(Au-PeEL)EBL1568423(CaPaEBR)ebr10809697(CaONFJC)MIL576412(OCoLC)865331162(Au-PeEL)EBL4444823(CaPaEBR)ebr11422807(OCoLC)1001387726(PPN)186164866(CaSebORM)9781118790823(MiAaPQ)EBC1568423(MiAaPQ)EBC4444823(EXLCZ)99267000000049362120131209d2014 uy 0engur|n|---|||||txtccrCarry on sound advice from schneier on security /Bruce Schneier1st editionIndianapolis, Indiana :Wiley,2014.©20141 online resource (378 p.)Description based upon print version of record.9781118790822 1-118-79081-2 Includes bibliographical references and index.Cover; Title Page; Copyright; Contents; Chapter 1 The Business and Economics of Security; Consolidation: Plague or Progress; Prediction: RSA Conference Will Shrink Like a Punctured Balloon; How to Sell Security; Why People Are Willing to Take Risks; How to Sell Security; Why Do We Accept Signatures by Fax?; The Pros and Cons of LifeLock; The Problem Is Information Insecurity; Security ROI: Fact or Fiction?; The Data Imperative; Caveat Emptor; Social Networking Risks; Do You Know Where Your Data Are?; Be Careful When You Come to Put Your Trust in the Clouds; Is Perfect Access Control Possible?News Media Strategies for Survival for JournalistsSecurity and Function Creep; Weighing the Risk of Hiring Hackers; Should Enterprises Give In to IT Consumerization at the Expense of Security?; The Vulnerabilities Market and the Future of Security; So You Want to Be a Security Expert; When It Comes to Security, We're Back to Feudalism; I Pledge Allegiance to the United States of Convenience; The Good, the Bad, and the Ugly; You Have No Control Over Security on the Feudal Internet; Chapter 2 Crime, Terrorism, Spying, and War; America's Dilemma: Close Security Holes, or Exploit Them OurselvesAre Photographers Really a Threat?CCTV Doesn't Keep Us Safe, Yet the Cameras Are Everywhere; Chinese Cyberattacks: Myth or Menace?; How a Classic Man-in-the-Middle Attack Saved Colombian Hostages; How to Create the Perfect Fake Identity; A Fetishistic Approach to Security Is a Perverse Way to Keep Us Safe; The Seven Habits of Highly Ineffective Terrorists; Why Society Should Pay the True Costs of Security; Why Technology Won't Prevent Identity Theft; Terrorists May Use Google Earth, but Fear Is No Reason to Ban It; Thwarting an Internal HackerAn Enterprising Criminal Has Spotted a Gap in the MarketWe Shouldn't Poison Our Minds with Fear of Bioterrorism; Raising the Cost of Paperwork Errors Will Improve Accuracy; So-Called Cyberattack Was Overblown; Why Framing Your Enemies Is Now Virtually Child's Play; Beyond Security Theater; Feeling and Reality; Refuse to Be Terrorized; Cold War Encryption Is Unrealistic in Today's Trenches; Profiling Makes Us Less Safe; Fixing Intelligence Failures; Spy Cameras Won't Make Us Safer; Scanners, Sensors Are Wrong Way to Secure the Subway; Preventing Terrorist Attacks in Crowded AreasWhere Are All the Terrorist Attacks?Hard to Pull Off; Few Terrorists; Small Attacks Aren't Enough; Worst-Case Thinking Makes Us Nuts, Not Safe; Threat of ""Cyberwar"" Has Been Hugely Hyped; Cyberwar and the Future of Cyber Conflict; Why Terror Alert Codes Never Made Sense; Debate Club: An International Cyberwar Treaty Is the Only Way to Stem the Threat; Overreaction and Overly Specific Reactions to Rare Risks; Militarizing Cyberspace Will Do More Harm Than Good; Rhetoric of Cyber War Breeds Fear-and More Cyber War; Attacks from China; GhostNet; ProfitableThe Boston Marathon Bombing: Keep Calm and Carry On Up-to-the-minute observations from a world-famous security expert Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport surveillance. This groundbreaking book features more than 160 commentaries on recent events including the Boston Marathon bombing, the NSA's ubiquitous surveillance programs, Chinese cyber-attacks, the privacy of cloud computing, and how to hack the Papal election. Timely as an Internet news report and always insightful, Schneier explains, debunks, and draws lessons from current events tSecurity systemsSecurity systemsCase studiesTerrorismCase studiesSecurity systems.Security systemsTerrorism363.28ST 277rvkSchneier Bruce60872MiAaPQMiAaPQMiAaPQBOOK9910814311403321Carry on3976144UNINA04013nam 22005895 450 991080012020332120250807143513.0981-9987-87-310.1007/978-981-99-8787-0(CKB)29838318300041(MiAaPQ)EBC31071655(Au-PeEL)EBL31071655(DE-He213)978-981-99-8787-0(OCoLC)1418966042(EXLCZ)992983831830004120240116d2024 u| 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierUnderstanding China's New Common Prosperity Significance, Connotations, and Goals /by Liu Yuanchun, Song Yang, Wang Fei, Zhou Guangsu1st ed. 2024.Singapore :Springer Nature Singapore :Imprint: Palgrave Macmillan,2024.1 online resource (250 pages)981-9987-86-5 Part I. Theory- Systematic understanding of common prosperity -- 1. Background and significance of common prosperity -- 2. The basis and connotation of common prosperity -- 3. Goal and measurement of common prosperity -- Part II. Practice -Jointly promote common prosperity -- 4. Principles and policies of top-level design -- 5. Construction and promotion of common prosperity demonstration area -- 6. Influence and opportunity of common prosperity -- 7. Realizing people's all-round development.This book explains China's new common prosperity policies—their significance, connotations, and goals—and explains the economic logic behind these often misunderstood policies. First, the authors explain the theory behind common prosperity. Why is the Chinese government changing its economic policies now, and what is its objectives and metrics? The authors then go on to explain how the new policies are being designed, what the test cases are across the country, and how the government, businesses, families, and individuals are working together to promote common prosperity. An important book that will help scholars around the world understand China's new economic bottom line. This book will be of interest to economists, sociologists, and sinologists. Liu Yuanchun is the President of Shanghai University of Finance and Economics, and the former Vice President of Renmin University of China, a member of China Finance 40 Forum and Chinese Economy 50 Forum, a distinguished economist, and a member of the expert committee of the 14th national five-year plan. Song Yang is a professor in School of Economics of Renmin University of China and holds a Ph.D in economics from Cornell University specializing in development and labor economics. He was selected into the 100 innovative young people program of China Association for Science and Technology. Wang Fei is an associate professor of the School of Labor and Human Resources, Renmin University of China, and a research fellow of the Institute of common prosperity and the Institute of national development and strategy. Zhou Guangsu is an associate professor at the School of Labor and Human Resources, Renmin University of China, and an ‘outstanding scholar’ of Renmin University of China.Economic developmentSocial policySchools of economicsEconomic GrowthSocial PolicyHeterodox EconomicsEconomic development.Social policy.Schools of economics.Economic Growth.Social Policy.Heterodox Economics.338.9Yuanchun Liu1587131Yang Song431009Fei Wang1587132Guangsu Zhou1587133MiAaPQMiAaPQMiAaPQBOOK9910800120203321Understanding China's New Common Prosperity3874480UNINA